Cryptographic Attacks and Network Security Controls Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the most significant direct impact of the vulnerability discovered by Wendy on her network?

  • Attackers may eavesdrop on network communications.
  • Automated attacks are more likely to succeed.
  • Attackers may use this information to gain administrative privileges. (correct)
  • Encryption will not protect credentials for this account.

Which technique is the most effective way to carry out a domain hijacking attack?

  • Network eavesdropping
  • ARP poisoning
  • DNS poisoning (correct)
  • Social engineering

Which character is the most important to restrict when performing input validation to protect against XSS attacks?

  • $
  • < (correct)
  • !
  • '

Darren visited a phishing site designed to look like a legitimate banking site after typing the bank's URL. What type of attack is likely taking place?

<p>DNS poisoning (A)</p> Signup and view all the answers

Which technology must be enabled on a wireless network for a Pixie Dust attack to succeed?

<p>WPS (C)</p> Signup and view all the answers

What type of attack is most productive when a website requires complex passwords?

<p>Online brute force (A)</p> Signup and view all the answers

What type of attack likely occurred when Vivian noticed millions of connection attempts from systems around the world that were never completed?

<p>DDoS (A)</p> Signup and view all the answers

Which attack against Bluetooth technology allows the attacker to steal information from the device?

<p>Bluesnarfing (A)</p> Signup and view all the answers

What is the most dangerous consequence of a buffer overflow attack?

<p>Arbitrary command execution (B)</p> Signup and view all the answers

Which of the following would not be considered an OSINT tool?

<p>Vulnerability scans (B)</p> Signup and view all the answers

What cryptographic attack may be used to find collisions in a hash function?

<p>Birthday attack (D)</p> Signup and view all the answers

Which is not a likely consequence of system sprawl?

<p>Improper input validation (D)</p> Signup and view all the answers

Which control would best protect Bob's service from an attack by Mal?

<p>Adding TLS encryption (D)</p> Signup and view all the answers

What is the primary issue that Charlie needs to address regarding the Windows XP systems?

<p>Obsolete operating system (D)</p> Signup and view all the answers

What type of attack is most likely taking place when an end user trying to visit a banking website sees an error message?

<p>Man-in-the-middle (B)</p> Signup and view all the answers

During a security review, Terry identified a system using the RC4 cipher with a 40-bit key to protect communications over Remote Desktop Protocol. What weakness does this pose?

<p>Low encryption strength (A)</p> Signup and view all the answers

What distinguishes a Birthday attack from other cryptographic attacks?

<p>Specifically targets hash functions (B)</p> Signup and view all the answers

What should Val do regarding the self-signed certificates?

<p>Conduct a risk assessment to determine appropriateness (A)</p> Signup and view all the answers

What does the MX record identify?

<p>Mail server for a domain (C)</p> Signup and view all the answers

How should Gina address the vulnerabilities related to port 3389?

<p>Upgrade encryption on the network port (B)</p> Signup and view all the answers

What type of attack is indicated in scenario 30.D?

<p>Phishing attack (D)</p> Signup and view all the answers

What is the purpose of SOA records in DNS?

<p>Provide information about authoritative servers for a DNS zone (A)</p> Signup and view all the answers

What action is recommended for certificates used by external users?

<p>Conduct a risk assessment before deciding (D)</p> Signup and view all the answers

Which feature is typically not supported by mobile device management solutions?

<p>Carrier unlocking (A)</p> Signup and view all the answers

In a round-robin load balancing scenario, which server will receive the next request after Server A?

<p>Server B (C)</p> Signup and view all the answers

What command-line utility can Ben use to identify active network connections and services listening on a Linux system?

<p>netstat (D)</p> Signup and view all the answers

How did the system receive the IP address shown in the ipconfig output?

<p>DHCP (C)</p> Signup and view all the answers

What type of VPN is Tim planning to deploy based on the high-level diagram provided?

<p>Site-to-site VPN (C)</p> Signup and view all the answers

To protect the password file for his service, what can Vince do?

<p>Encrypt the password file (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Use Quizgecko on...
Browser
Browser